Enabling Your Small Business - Innovative Comp

4
SOLUTION BRIEF ENABLING YOUR SMALL BUSINESS Secure Yet Simple Information Technology It all started with a couple of people, a couple computers and a good idea. Now you have a growing company with employees, an office, and a range of business systems. One key to your success will be continued agility and efficiency as you scale your operation. And that will only be possible if those systems are secure yet accessible to your employees - anytime, anywhere. In fact, a recent survey of small business owners found that two-thirds view Information Technology (IT) and security as critical to their business and think about it all the time1! However IT is constantly changing, with BYOD, more connected devices and wireless access creating new infrastructure demands. As is the threat landscape, conducting more than 1600 cyberthreat assessments in 2016, Fortinet found that the average small business was compromised by 4 pieces of active malware. (Fortinet Cyberthreat Assessment Program, 2016) That’s where Fortinet can help. Specifically, Fortinet Connected UTM for small offices delivers all of the access and security technologies a growing business needs in a solution that is easy to use and affordable. TRADITIONAL UNIFIED THREAT MANAGEMENT Typically, smaller businesses will be using a Unified Threat Management (UTM) solution, defined in the Gartner IT Glossary as a converged platform of point security products, particularly suited to small and midsize businesses (SMBs). Typical feature sets fall into three main categories on one device: firewall/intrusion prevention system (IPS)/virtual private network, secure Web gateway security (URL filtering and Web antivirus) and messaging security (anti- spam, mail AV). In this manner, they are able to simplify the complexity of enterprise- class security and bolster protection of their business despite limited budgets and staff. NEW COMPLEXITY EMERGES However, as organizations have grown and/ or technology has continued to evolve, IT has become more complicated. Whether it is wireless access points providing connectivity to an increasingly mobile, multi- device workforce, additional wired switching to support more connected devices in the workplace, or the rise of cloud services, today’s small business networks have grown much more complicated – with a patchwork of components from various vendors. In fact, 60% of small business owners reported they use a mix of IT (whether on premise or in the cloud) from multiple vendors. n Increase the Security of Your Business n Reduce the Complexity of Your Network n Rely on the Most Popular Appliance in the World CONNECTED UTM The pioneer in the Unified Threat Management (UTM) market, Fortinet continues to deliver security and simplicity for small businesses with our Connected UTM solution

Transcript of Enabling Your Small Business - Innovative Comp

Page 1: Enabling Your Small Business - Innovative Comp

SOLUTION BRIEF

ENABLING YOUR SMALL BUSINESSSecure Yet Simple Information Technology

It all started with a couple of people, a couple computers and a good idea. Now you have a growing company with employees, an office, and a range of business systems. One key to your success will be continued agility and efficiency as you scale your operation. And that will only be possible if those systems are secure yet accessible to your employees - anytime, anywhere. In fact, a recent survey of small business owners found that two-thirds view Information Technology (IT) and security as critical to their business and think about it all the time1!

However IT is constantly changing, with BYOD, more connected devices and wireless access creating new infrastructure demands. As is the threat landscape, conducting more than 1600 cyberthreat assessments in 2016, Fortinet found that the average small business was compromised by 4 pieces of active malware. (Fortinet Cyberthreat Assessment Program, 2016)

That’s where Fortinet can help. Specifically, Fortinet Connected UTM for small offices delivers all of the access and security technologies a growing business needs in a solution that is easy to use and affordable.

TRADITIONAL UNIFIED THREAT MANAGEMENT

Typically, smaller businesses will be using a Unified Threat Management (UTM) solution, defined in the Gartner IT Glossary as a converged platform of point security products, particularly suited to small and midsize businesses (SMBs). Typical feature sets fall into three main categories on one

device: firewall/intrusion prevention system (IPS)/virtual private network, secure Web gateway security (URL filtering and Web antivirus) and messaging security (anti-spam, mail AV). In this manner, they are able to simplify the complexity of enterprise-class security and bolster protection of their business despite limited budgets and staff.

NEW COMPLEXITY EMERGES

However, as organizations have grown and/or technology has continued to evolve, IT has become more complicated. Whether it is wireless access points providing connectivity to an increasingly mobile, multi-device workforce, additional wired switching to support more connected devices in the workplace, or the rise of cloud services, today’s small business networks have grown much more complicated – with a patchwork of components from various vendors. In fact, 60% of small business owners reported they use a mix of IT (whether on premise or in the cloud) from multiple vendors.

nn Increase the Security of Your Business

nn Reduce the Complexity of Your Network

nn Rely on the Most Popular Appliance in the World

CONNECTED UTM

The pioneer in the Unified Threat Management (UTM) market, Fortinet continues to deliver security and simplicity for small businesses with our Connected UTM solution

Page 2: Enabling Your Small Business - Innovative Comp

2

SOLUTION BRIEF: ENABLING YOUR SMALL BUSINESS

At the same time, the threat landscape continues to evolve with new attack avenues and techniques. While 2015 was clearly dominated by web application attacks again, the year prior was dominated by Point of Sale (POS) compromises. And early indications are that 2016 will be remembered as the year of ransomware.

And the 2016 Verizon report indicated that the vast majority of malware found was unique to the organization and seen for only 58 seconds or less. As a result of these trends, security technologies continue to evolve and a growing emphasis is currently placed on measures like web application firewall and sandboxing.

58 secondsthe maximum life of 99% of malware leading to incidents

THE SOLUTION FOR SMALL BUSINESSES

As a result of these continued IT and security evolutions, especially the resulting complexity, Fortinet is continuing to extend the power and simplicity of its UTM appliances to encompass new networking and security capabilities. This is called Fortinet’s Connected UTM.

BUILT IN NETWORKING

Today’s converged FortiGate UTM appliances come in a wide range of models with varying hardware specifications. Small businesses can choose “WiFi” options which include integrated wireless access points directly or just the wireless controller to manage separate access points from a single console. They can also choose among high port density desktop models – including

source Verizon, DBIR, 2016

http://www.verizonenterprise.com/verizon-insights-lab/

dbir/2016/

2006 2007 2008 2009 2010 2011 2012 2013 2014 2015

0%

20%

40%

60%

80%

100% n Web App Attacks

n Insider and Privilege Misuse

n POS Intrusions

n Payment Card Skimmers

n Miscellaneous Errors

n Physical Theft/Loss

n Everything Else

n Denial-of-Service Attacks

n Cyber-espionage

n Crimeware

up to 16 built in switch points – as well as those with integrated Power over Ethernet (PoE) capability. All with an eye to further consolidating small business networking along with security. Other options include dedicated switches and access points for even more integrated ports and wifi coverage.

EVEN MORE CONSOLIDATED SECURITY SERVICES

At the same time, FortiGate UTM appliances also include endpoint protection, web application protection and cloud sandboxing to continue bringing the latest enterprise-class technologies to the small and medium business.

Specifically small business can now increase their ability to:

nn Extend network security policy to endpoints whether they are on or off the network.

nn Shield web-based applications from exploit and intrusion.

nn Continue inspecting apparently benign files to identify previously unknown malware.

BENEFITS

With Fortinet Connected UTM, reinstate simplicity over an increasingly complex IT environment and continue to raise security in response to an evolving threat landscape.

FunctionOn the FortiGate

Off-box Option

Network Security √

Email System & Security √ FortiMail

Web Application Security √ FortiWeb

Endpoint Security √ FortiClient

Wireless AP √ FortiAP

Switching √ FortiSwitch

PBX System √ FortiVoice

Management/Reporting √ FortiCloud

Page 3: Enabling Your Small Business - Innovative Comp

3

SOLUTION BRIEF: ENABLING YOUR SMALL BUSINESS

Customers can select a single appliance with fully converged networking and security or multiple security and networking devices all managed from a single console.

Either way, small businesses benefit from:

nn A single vendor. and support contact

nn A broad and integrated solution.

nn Top rated components.

nn Volume purchasing.

nn Cloud based management, log storage and more.

As a result, small businesses can reduce the time and money spent procuring, deploying and managing IT and security, while also reducing their risk of a security incident.

WHY FORTINET

WE ARE THE LEADER

Fortinet is the pioneer of the multi-function firewall now referred to as the UTM. We are a recognized leader in the Gartner Magic Quadrant noted for setting the cadence in the market. We are also the most popular network security appliance in the world, according to IDC.

WE DELIVER THE BEST PROTECTION

At the same time, we develop and continually update all of our security services in-house through our FortiGuard Labs. We consistently earn top marks in independent, third-party testing conducted by organizations like NSS Labs, Virus Bulletin, AV Comparatives and others.

Source: IDC Worldwide Security Appliances Tracker, March 2016 (based on annual unit shipments)

2011 2012 2013 2014 2015

500,000

400,000

300,000

200,000

100,000

Check Point

Palo Alto NetworksJuniper Networks

Cisco

Certification Fortinet Check Point Cisco Palo Alto Juniper SRX FireEye

NSS Labs Firewall NGFW ¡ ¡ ¡ ¡ ¡ X

NSS Labs Data Center Firewall ¡ X X X X X

NSS Labs Breach Detection System ¡ ¡ ¡ X X ¡

NSS Labs WAF ¡ X X X X X

NSS Labs Next Gen IPS ¡ X ¡ X X

NSS Labs Data Center IPS X X X ¡ X

BreakingPointResiliency Score ¡ X X X X

ICSA Firewall ¡ ¡ X ¡ ¡ X

ICSA IPS ¡ X X X X X

ICSA Antivirus ¡ X X X X X

ICSA WAF ¡ X X X X X

ICSA ATD ¡ X X ¡ X X

VB100 Virus ¡ ¡ X X X X

AV Comparative ¡ X X X X X

Common Criteria ¡ ¡ ¡ ¡ ¡ ¡

¡ RECOMMENDED NEUTRAL ¡ CAUTION

Page 4: Enabling Your Small Business - Innovative Comp

SOLUTION BRIEF: ENABLING YOUR SMALL BUSINESS

Copyright © 2017 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.

GLOBAL HEADQUARTERSFortinet Inc.899 Kifer RoadSunnyvale, CA 94086United StatesTel: +1.408.235.7700www.fortinet.com/sales

EMEA SALES OFFICE905 rue Albert Einstein06560 ValbonneFranceTel: +33.4.8987.0500

APAC SALES OFFICE300 Beach Road 20-01The ConcourseSingapore 199555Tel: +65.6513.3730

LATIN AMERICA HEADQUARTERSSawgrass Lakes Center13450 W. Sunrise Blvd., Suite 430Sunrise, FL 33323Tel: +1.954.368.9990

April 19, 2017

WE OFFER THE MOST INTEGRATED CAPABILITIES

With the broadest set of security and networking technologies, we deliver the most comprehensive UTM solution in the market. That translates to the easiest and most affordable solution for small businesses.

CONCLUSION

The pioneer in the Unified Threat Management (UTM) market, Fortinet continues to deliver security and simplicity for small businesses with our Connected UTM. Customers benefit from top rated protection, the broadest set of integrated networking and security components, with one console, vendor and support contact. As a result, small businesses can continue to grow with the very latest secure IT to enable them.

IT Provider Management

Integrated Wireless

Integrated Endpoint/Mobile Security

Consolidated Security and Switching

1 U.S. Osterman survey. http://www.fortinet.com/resource_center/analyst_reports/smb-it-security-priorities.html

2 Verizon DBIR, 2016. http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/

71050-0-A-EN